Role in IT decision-making process:Align Business & IT GoalsCreate IT StrategyDetermine IT NeedsManage Vendor RelationshipsEvaluate/Specify Brands or VendorsOther RoleAuthorize PurchasesNot Involved

Work Phone:

Company:

Company Size:

Industry:

Street Address

City:

Zip/postal code

State/Province:

Country:

Occasionally, we send subscribers special offers from select partners. Would you like to receive these special partner offers via e-mail?YesNo

Your registration with Eweek will include the following free email newsletter(s):News & Views

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

Do You Want a Shirt With Your Vulnerability Report?

Different organizations react differently to security disclosures as events this past week demonstrate, including a Microsoft zero-day vulnerability that continues to be exploited.

Security research should not be a thankless task; it should be a task that is celebrated, rewarded and, more importantly, acted on with all the necessary expediency that a given piece of research might deserve.

A number of events occurred this week that show how different groups value and act on security research at very different rates. On the browser front, Microsoft continues to be pummeled with an Internet Explorer (IE) zero-day flaw that is now being actively exploited. That's two weeks after Microsoft first learned about the issue and—still—no patch.

Microsoft revealed that as part of its October Patch Tuesday update set to be available on Tuesday, Oct. 8, the flaw known as CVE-2013-3893 would be patched. Sure, Microsoft had a "Fix-It" temporary fix available for IE, but the reality is that many users don't know about updates until they are made available on Patch Tuesday via the Windows Update system. Tens of millions of IE users have potentially been at risk for two weeks, and in my view that's just a totally unacceptable situation.

In contrast, Mozilla, the vendor behind the open-source Firefox Web browser, this week revealed that it too was at risk from a security vulnerability. Mozilla's director of security assurance, Michael Coats (whom eWEEK caught up with for a video interview recently), noted in a blog post that on Sept. 24 Mozilla was notified of a security vulnerability in its Persona authentication system. That security notification came in by way of Mozilla's bug bounty program that rewards researchers for responsibly disclosing security research information. Within seven days of the disclosure (and without an attack in the wild), Mozilla developers issued an update that fixed the issue.

That's seven days, not 14, and it came with a reward for the research too.

Mozilla's rewards to security researchers are not just a handshake and a slap on the back. Mozilla pays cash. It's something that Yahoo is now set to do as well.

You see until this point, Yahoo has been recognizing those who help out with security research by sending them a T-shirt.

"Out with t-shirts that I buy," Ramses Martinez, director at Yahoo, wrote in a tumblr post this week. "We will now reward individuals and firms that identify what we classify as new, unique and/or high risk issues between $150 - $15,000. The amount will be determined by a clear system based on a set of defined elements that capture the severity of the issue."

T-shirts are all fine and nice, but cash is better and actually fixing flaws quickly to secure users is even better.

Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.